Difference between revisions of "Netband Project - IPSec/Gre"

From Teknologisk videncenter
Jump to: navigation, search
m (Netband Project - IPSec/GRE)
m (Configuration for the Head-End)
Line 12: Line 12:
 
  group 5
 
  group 5
 
  lifetime 1000
 
  lifetime 1000
crypto isakmp key blehblahbluh address 0.0.0.0 0.0.0.0
+
crypto isakmp key CiscoDisco address 0.0.0.0 0.0.0.0
 
crypto ipsec transform-set tset-AES256-SHA esp-aes 256 esp-sha-hmac
 
crypto ipsec transform-set tset-AES256-SHA esp-aes 256 esp-sha-hmac
 
crypto dynamic-map test-dynamic 40
 
crypto dynamic-map test-dynamic 40
Line 18: Line 18:
 
  set transform-set tset-AES256-SHA tset-TDES-SHA
 
  set transform-set tset-AES256-SHA tset-TDES-SHA
 
crypto map test-crypto 40 ipsec-isakmp dynamic test-dynamic
 
crypto map test-crypto 40 ipsec-isakmp dynamic test-dynamic
 +
interface Tunnel2
 +
ip address 10.255.0.9 255.255.255.252
 +
ip mtu 1420
 +
ip flow ingress
 +
ip rip advertise 10
 +
tunnel source Loopback1
 +
tunnel destination 192.168.6.5
 +
!
 +
ip route 192.168.6.5 255.255.255.255 89.150.154.1
 
</pre>
 
</pre>

Revision as of 09:30, 14 April 2009

<accesscontrol>NetBand</accesscontrol>

Netband Project - IPSec/GRE

This page is part of the Netband Project

Configuration for the Head-End

This configuration is for the "server" part og the tunnel, with the static IP.

crypto isakmp policy 10
 encr aes 256
 authentication pre-share
 group 5
 lifetime 1000
crypto isakmp key CiscoDisco address 0.0.0.0 0.0.0.0
crypto ipsec transform-set tset-AES256-SHA esp-aes 256 esp-sha-hmac
crypto dynamic-map test-dynamic 40
 description Hmmm
 set transform-set tset-AES256-SHA tset-TDES-SHA
crypto map test-crypto 40 ipsec-isakmp dynamic test-dynamic
interface Tunnel2
 ip address 10.255.0.9 255.255.255.252
 ip mtu 1420
 ip flow ingress
 ip rip advertise 10
 tunnel source Loopback1
 tunnel destination 192.168.6.5
!
ip route 192.168.6.5 255.255.255.255 89.150.154.1